How Can We Turn a Hacker’s Toolkit Against Them? The Evolution of a Phishing Email
By Jack Chapman, VP of Threat Intelligence, Egress Hackers use many tools at each stage of an attack and with the sophistication of attacks escalating…
By Jack Chapman, VP of Threat Intelligence, Egress Hackers use many tools at each stage of an attack and with the sophistication of attacks escalating…
In a startling revelation, ChatGPT, the advanced AI chatbot developed by OpenAI, has been found to have a significant security vulnerability. The discovery, first reported…
NSW’s neutral host and active sharing models for mobile infrastructure sharing could become the model for a national program, if the federal government adopts the…
Is There a Risk of Cyber Fallout? By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Executive Summary At the end of June, a Russian mercenary organization…
The secret cryptographic algorithms that underpin TETRA are to be published, in response to a collection of vulnerabilities discovered earlier this year. The European Telecommunications…
One major reason for the progress is a May 2021 Executive Order that pushes federal agencies to speedily embrace the “never trust; always verify” cybersecurity…
Samsung Electronics is notifying some of its customers of a data breach that exposed their personal information to an unauthorized individual. The company says that…
Another important update round for this month’s Patch Tuesday. Microsoft has patched a total of 63 vulnerabilities in its operating systems. Five of these vulnerabilities…
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on their Dark Web sites. In…
By Ilona Cohen, Chief Policy Officer, and Michael Woolslayer, Policy Counsel The U.K. is in the midst of a multi-year review of its primary anti-hacking…
The IoT Security Foundation’s fifth annual report into the state of vulnerability disclosure consumer Internet of Things, produced by Copper Horse and supported by HackerOne,…
Our understanding of leadership and employee needs and the ability to build learning and development content made it easier for us to make development recommendations…